BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] ssh keys question
- Subject: [Discuss] ssh keys question
- From: ingegnue at riseup.net (IngeGNUe)
- Date: Fri, 17 Jun 2016 21:36:42 -0400
- In-reply-to: <5764883F.3030807@borg.org>
- References: <mailman.11.1466179204.26887.discuss@blu.org> <ee255849986a8455a436c0cff185444c.squirrel@webmail.ci.net> <5764883F.3030807@borg.org>
On 06/17/16 19:31, Kent Borg wrote: > It is easy to "curve fit" and an idea around three random words (a good > password), but horrible to try it on twelve (a good passphrase)--it gets > very bumpy. And blind typing it without an echo is additionally error > prone. One concern I have is with password crackers that use dictionary attacks. Are you saying that with enough words strung together, such attacks won't matter as much?
- Follow-Ups:
- [Discuss] ssh keys question
- From: kentborg at borg.org (Kent Borg)
- [Discuss] ssh keys question
- References:
- [Discuss] ssh keys question
- From: richb at pioneer.ci.net (Rich Braun)
- [Discuss] ssh keys question
- From: kentborg at borg.org (Kent Borg)
- [Discuss] ssh keys question
- Prev by Date: [Discuss] ssh keys question
- Next by Date: [Discuss] ssh keys question
- Previous by thread: [Discuss] ssh keys question
- Next by thread: [Discuss] ssh keys question
- Index(es):